Cyber Security
Contents
- 1 Definitions
- 1.1 European Definitions
- 1.2 National Definitions
- 1.2.1 Albania
- 1.2.2 Australia
- 1.2.3 Austria
- 1.2.4 Barbados
- 1.2.5 Belgium
- 1.2.6 Brazil
- 1.2.7 Bulgaria
- 1.2.8 Burkina-Faso
- 1.2.9 Cameroon (Cameroun)
- 1.2.10 Canada
- 1.2.11 Chile
- 1.2.12 Colombia
- 1.2.13 Croatia
- 1.2.14 Cuba
- 1.2.15 Cyprus
- 1.2.16 Czech Republic
- 1.2.17 Denmark
- 1.2.18 Egypt
- 1.2.19 Finland
- 1.2.20 France
- 1.2.21 Germany
- 1.2.22 Hungary
- 1.2.23 India
- 1.2.24 Islamic Republic of Afghanistan
- 1.2.25 Israel
- 1.2.26 Italy
- 1.2.27 Jamaica
- 1.2.28 Kenya
- 1.2.29 Kingdom of Saudi Arabia
- 1.2.30 Kosovo
- 1.2.31 Latvia
- 1.2.32 Lithuania
- 1.2.33 Luxembourg
- 1.2.34 Malta
- 1.2.35 Moldova
- 1.2.36 Montenegro
- 1.2.37 Morocco
- 1.2.38 Netherlands
- 1.2.39 New Zealand
- 1.2.40 Nigeria
- 1.2.41 Norway
- 1.2.42 Pakistan
- 1.2.43 Paraguay
- 1.2.44 Philippines
- 1.2.45 Poland
- 1.2.46 Qatar
- 1.2.47 Republic of Trinidad & Tobago
- 1.2.48 Romania
- 1.2.49 Russian Federation
- 1.2.50 Saudi Arabia
- 1.2.51 Slovenia
- 1.2.52 South Africa
- 1.2.53 Sweden
- 1.2.54 Thailand
- 1.2.55 Turkey
- 1.2.56 United Kingdom (UK)
- 1.2.57 United States
- 1.3 International organisations
- 1.4 International standards
- 1.5 Other Definitions
- 2 See also
- 3 Notes
Definitions
European Definitions
EU
National Definitions
Albania
Australia
Austria
Cyber Sicherheit beschreibt den Schutz eines zentralen Rechtsgutes mit rechtsstaatlichen Mitteln vor akteursbezogenen,technischen, organisations- und naturbedingten Gefahren, die die Sicherheit des Cyber Space (inklusive Infrastruktur- und Datensicherheit) und die Sicherheit der Nutzer im Cyber Space gefährden. Cyber Sicherheit trägt dazu bei, die Gefährdungen zu erkennen, zu bewerten und zu verfolgen sowie die Fähigkeit zu stärken, Störungen im und aus dem Cyberspace zu bewältigen, die damit verbundenen Folgen zu mindern sowie die Handlungs- und Funktionsfähigkeit der davon betroffenen Akteure, Infrastrukturen und Dienste wieder herzustellen. [5]
Barbados
Belgium
Cybersécurité est la situation où la protection du cyberespace est proportionelle à la cybermenace et aux conséquences possibles de cyberattaques. [8]
Brazil
Cybersecurity is the art to ensure the existence and continuity of the information society of a nation, ensuring and protecting in Cyberspace, their information assets and their critical infrastructure.
Bulgaria
Burkina-Faso
Cameroon (Cameroun)
Canada
Ensemble des technologies, des processus, des pratiques et des mesures d’atténuation et d’intervention conçus pour protéger les réseaux, les ordinateurs, les programmes et les données contre les attaques, les dommages ou les accès non autorisés afin d’assurer la confidentialité, l’intégrité et la disponibilité. [14]
Chile
Colombia
Cyber security is the ability of the state to minimize the level of risk their citizens from threats or incidents of cyber nature are exposed to.
Croatia
Cyber security includes activities and measures to achieve confidentiality, integrity and availability of data and systems in cyberspace. [18]
Cuba
Cyprus
I.e. in most cases connected to the Internet, and this term also covers the safe and secure usage of these systems by end users.
Czech Republic
Collection of legal, organizational, technological and educational means aimed at providing protection of cyberspace. [22]
Denmark
Egypt
Finland
Cyber security is a condition in which the threats and risks caused by cyber operating environment to the vital operations of society or other operations dependent on cyber operating environment are in control. -unofficial translation- [26]
France
Cybersécurité: état recherché pour un système d’information lui permettant de résister à des événements issus du cyberespace susceptibles de compromettre la disponibilité, l’intégrité ou la confidentialité des données stockées, traitées ou transmises et des services connexes que ces systèmes offrent ou qu’ils rendent accessibles. [28]
Germany
(Globale) Cyber-Sicherheit ist der anzustrebende Zustand der IT-Sicherheitslage, in welchem die Risiken des globalen Cyber-Raums auf ein tragbares Maß reduziert sind. Cyber-Sicherheit in Deutschland ist demnach der anzustrebende Zustand der IT-Sicherheitslage, in welchem die Risiken des deutschen Cyber-Raums auf ein tragbares Maß reduziert sind. Cyber-Sicherheit (in Deutschland) entsteht durch die Summe von geeigneten und angemessenen Maßnahmen. [30]
(Global) cyber security is the desired condition of the IT security situation, in which the risks of the global cyberspace have been reduced to an acceptable minimum. Cyber security in Germany is thus the desired condition of the IT security situation, in which the risks of the German cyberspace have been reduced to an acceptable minimum. Cyber security (in Germany) is developed through the sum of suitable and adequate safeguards. [31]
Hungary
India
Islamic Republic of Afghanistan
Israel
Italy
Queste misure includono: audit di sicurezza, gestione di aggiornamenti (patches) di sicurezza, procedure di autenticazione, gestione degli accessi, analisi del rischio, rilevazione e reazione ad incidenti/attacchi, mitigazione degli impatti, recupero delle componenti oggetto di attacco, addestramento e formazione del personale, nonché verifica e potenziamento della sicurezza fisica dei locali dove sono collocati i sistemi informativi e di comunicazione.
Jamaica
Kenya
Kingdom of Saudi Arabia
Kosovo
Latvia
Organisation and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment.
Lithuania
Kibernetinis saugumas: visuma teisinių, informacijos sklaidos, organizacinių ir techninių priemonių, skirtų kibernetiniams incidentams išvengti, aptikti, analizuoti ir reaguoti į juos, taip pat įprastinei elektroninių ryšių tinklų, informacinių sistemų ar pramoninių procesų valdymo sistemų veiklai, įvykus šiems incidentams, atkurti. [43]
Luxembourg
Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organisation and user assets. [45]
Les actifs des organisations et des utilisateurs comprennent les dispositifs informatiques connectés, le personnel, l’infrastructure, les applications, les services, les systèmes de télécommunication, et la totalité des informations transmises et/ou stockées dans le cyberenvironnement. La cybersécurité cherche à garantir que les propriétés de sécurité des actifs des organisations et des utilisateurs sont assurées et maintenues par rapport aux risques affectant la sécurité dans le cyberenvironnement. Les objectifs généraux en matière de sécurité sont les suivants: disponibilité; intégrité, qui peut englober l’authenticité et la non-répudiation; confidentialité.
Organisation and user assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cybersecurity strives to ensure the attainment and maintenance of the security properties of the organisation and user assets against relevant security risks in the cyber environment. The
general security objectives comprise the following: availability;integrity, which may include authenticity and non-repudiation; and confidentiality.
Malta
Cyber security strives to preserve the availability and integrity of the networks and infrastructure and the confidentiality of the information contained therein.
Moldova
Montenegro
Morocco
Cybersecurity: Desired situation for an information system enabling it to withstand events arising from cyberspace that may compromise the availability, integrity or confidentiality of the data stored, processed or transmitted.
Netherlands
Cyber security refers to efforts to prevent damage caused by disruptions to, breakdowns in or misuse of ICT and to repair damage if and when it has occurred. [51]
Such damage may consist of any or all of the following: reduced reliability of ICT, limited availability and violation of
the confidentiality and/or integrity of information stored in the ICT systems.
New Zealand
Nigeria
Norway
Cybersikkerhet: Beskyttelse av data og systemer som er koblet til internettet. [57]
Pakistan
Paraguay
Philippines
Poland
Cyber RP (RP security in cyberspace) is the process of ensuring the safe operation of in cyberspace state as a whole, its structure, individuals and legal persons, including companies and other entities without legal personality, as well as at their disposal ICT systems and information resources in the global cyberspace. [63]
Qatar
مجموعة ا أ لدوات والسياسات والمفاهيم وا إ لجراءات ا أ لمنية والمبادئ التوجيهية ومنهجيات إدارة المخاطر وا إ لجراءات والتدريب وأفضل الممارسات وسبل التأمي ن والتقنيات ال ت ي يمكن استخدامها لحماية بيئة الفضاء ا إ للك ترو ني وأصول[66]
Organization and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cyber security strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment. The general security objectives comprise the following: confidentiality, integrity (which may include authenticity and non-repudiation), and availability.
Republic of Trinidad & Tobago
La ciberseguridad es el conjunto de herramientas, políticas, conceptos de seguridad, salvaguardas de seguridad, directrices, métodos de gestión de riesgos, acciones, formación, prácticas idóneas, seguros y tecnologías que pueden utilizarse para proteger los activos de la organización y los usuarios en el ciberentorno. [67]
Romania
Starea de normalitate rezultată în urma aplicării unui ansamblu de măsuri proactive şi reactive prin care se asigură confidenţialitatea, integritatea, disponibilitatea, autenticitatea şi nonrepudierea informaţiilor în format electronic, a resurselor şi serviciilor publice sau private, din spaţiul cybernetic. Măsurile proactive şi reactive pot include politici, concepte, standarde şi ghiduri de securitate, managementul riscului, activităţi de instruire şi conştientizare, implementarea de soluţii tehnice de protejare a infrastructurilor cibernetice, managementul identităţii, managementul consecinţelor. [68]
Russian Federation
Cyber security (RAW TRANDLATION): a set of conditions in which all the components are protected from maximum possible number of cyber threats and impacts of unwanted consequences.
информационная инфраструктура: совокупность технических средств и систем формирования, преобразования, передачи, использования и хранения информации. [70]
Saudi Arabia
Slovenia
South Africa
Sweden
Thailand
Turkey
Cyber Security is the protection of information systems that make up the cyber space from attacks, ensuring the confidentiality, integrity and accessibility of the information being processed in this space, detection of attacks and cyber security incidents, putting into force the countermeasures against these incidents and then putting these systems back to their states previous to the cyber security incident. [78]
United Kingdom (UK)
United States
NIA
NIPP
NIST
Synonymous with security controls and safeguards.
DoD
International organisations
ITU-T
Organization and user’s assets include connected computing devices,personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cyber security strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment.
World Economic Forum
International standards
ISO/IEC
Other Definitions
Scotland
East-West Institute (Russia-US)
Кибербезопасность: свойство (киберпространства, киберсистемы), противостоять, намеренным и/или, ненамеренным угрозам, а также, реагировать на них и, восстанавливаться после воздействия этих угроз. [88]
See also
Notes
- ↑ Joint Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions - Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, 07/02/2013
- ↑ PROJEKT LIGJ PËR SIGURINË KIBERNETIKE
- ↑ Rights and Protections on Cyber Security, Australian Attorney-General’s Department
- ↑ Austrian Cyber Security Strategy, Federal Chancellery of the Republic of Austria, Vienna (2013)
- ↑ Österreichische Strategie für Cyber Sicherheit (2013)
- ↑ Emergency Procedures: From Plan to Practice
- ↑ Cyber Security Strategy.be (2012)
- ↑ Cyber Security Strategy.be (2012)
- ↑ GUIA DE REFERÊNCIA PARA A SEGURANÇA DAS INFRAESTRUTURAS CRÍTICAS DA INFORMAÇÃO Versão 01 (Nov. 2010)/ Portaria Nº 45, de 8 de setembro de 2009.
- ↑ „Кибер устойчива България 2020” - Republic of Bulgaria: national cyber security strategy "Cyber Resilient Bulgaria 2020"(2016)
- ↑ Plan National de Cybersécurité (2010)
- ↑ LOI N°2010/012 DU 21 DECEMBRE 2010 RELATIVE A LA CYBERSECURITE ET LA CYBERCRIMINALITE AU CAMEROUN
- ↑ Canada’s Cyber Security Strategy (2010). For a Stronger and More Prosperous Canada (2010)
- ↑ Vocabulaire de la gestion des urgencies/Emergency Management Emergency Management Vocabulary 281 (2012)
- ↑ BASES PARA UNA POLÍTICA NACIONAL DE CIBERSEGURIDAD, MARZO DE 2015, Chile
- ↑ Conpes 3510
- ↑ Conpes 3854 POLÍTICA NACIONAL DE SEGURIDAD DIGITAL (2016)
- ↑ National Cyber Security Strategy draft (2015)
- ↑ Glossary of Cyber terms/Glosario de términos, Centro de Seguridad del Ciberespacio
- ↑ Cybersecurity Strategy of the Republic of Cyprus (23 April 2012)
- ↑ Act No. 181 of 23 July 2014 On Cyber Security and Change of Related Acts (Act on Cyber Security)]
- ↑ Výkladový slovník kybernetické bezpečnosti (2013)
- ↑ Danish Cyber Security Strategy, 2014
- ↑ Ministry of Communications and Information Technology (MCIT) - Cyber Security
- ↑ Finlands' Cyber Security Strategy
- ↑ Vocabulary of Comprehensive Security. Helsinki (TSK 47) (2014)
- ↑ Information systems defence and security: France's Strategy
- ↑ La Stratégie de la France en matière de défense et de sécurité des systèmes d’information (2011)
- ↑ Cyber-Sicherheitsstrategie für Deutschland 2016
- ↑ Protection of Critical Infrastructures, BMI.
- ↑ UP KRITIS, BSI, 2014
- ↑ Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
- ↑ Information Technology Act Ammendment (2008)
- ↑ National Cyber Security Strategy of Afghanistan (2014)
- ↑ Advancing National Cyberspace Capabilities (2011)
- ↑ IL LINGUAGGIO DEGLI ORGANISMI INFORMATIVI Glossario (2013)
- ↑ Jamaica's National Cyber Security Strategy
- ↑ Kenya's National Cyber Security Strategy
- ↑ Developing National Information Security Strategy for the Kingdom of Saudi Arabia NISS draft 7
- ↑ Strategjia Shtetërore për Sigurinë Kibernetike dhe Plani i Veprimit 2016 – 2019
- ↑ Latvia's National Cyber Security Strategy
- ↑ GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 2011–2019
- ↑ LIETUVOS RESPUBLIKOS KIBERNETINIO SAUGUMO ĮSTATYMAS 2014 m. gruodžio 11 d. Nr. XII-1428 Vilnius
- ↑ Stratégie nationale en matière de cyber sécurité II (2015)
- ↑ National Cybersecurity Strategy II (2015)
- ↑ Malta Cyber Security Strategy 2016
- ↑ NATIONAL STRATEGY for information society development “Digital Moldova 2020” (2013)
- ↑ NATIONAL CYBER SECURITY STRATEGY FOR MONTENEGRO 2013-2017
- ↑ STRATEGIE NATIONALE EN MATIERE DE CYBERSECURITE, Morocco, 2011
- ↑ Nationale Cybersecurity Strategie 2: van bewust naar bekwaam
- ↑ National Cyber Security Strategy 2: From Awareness to Capability, Ministry of Security and Justice, The Hague, The Netherlands
- ↑ Cyber Security Beeld Nederland 4, 2014, Ministry of Security and Justice, The Hague, The Netherlands
- ↑ Cyber Security Beeld Nederland 5, 2015, Ministry of Security and Justice, The Hague, The Netherlands
- ↑ New Zealand’s Cyber Security Strategy (2011)
- ↑ National Cyber Security Strategy Nigeria (2014)
- ↑ Cyber Security Strategy for Norway (2012)
- ↑ Nasjonal strategi for informasjonssikkerhet (2012)
- ↑ draft BILL to provide for the establishment of a National Cyber Security Council
- ↑ Plan Nacional de Ciberseguridad, República del Paraguay, 2016
- ↑ National Cyber Security Plan (Working Draft v1.13 as of December 2016)
- ↑ Republic Act No. 10175, 2012
- ↑ DND GLOSSARY OF CYBER SECURITY TERMS (v.4)
- ↑ Doktryna cyberbezpieczeństwa Rzeczypospolitej Polskiej, Warsaw (2015)
- ↑ (MINI)SŁOWNIK BBN: Propozycje nowych terminów z dziedziny bezpieczeństwa (2015) - proposed definition
- ↑ QATAR National Cyber Security Strategy (May 2014)
- ↑ الاستراتيجية الوطنية للأمن السيبراني QATAR NCSS - Arabic version (May 2014)
- ↑ Government of the Republic of Trinidad & Tobago, National Cyber Security Strategy (December 2012)
- ↑ Hotărârea nr. 271/2013 pentru aprobarea Strategiei de securitate cibernetică
- ↑ КОНЦЕПЦИЯ СТРАТЕГИИ КИБЕРБЕЗОПАСНОСТИ РОССИЙСКОЙ ФЕДЕРАЦИИ (Draft Cyber Security Strategy 2016)
- ↑ Конвенция об обеспечении международной информационной безопасности (концепция)
Convention on ensuring international information security; draft 2015 - ↑ Drafting National Information Security Strategy for the Kingdom of Saudi Arabia (Draft 7 - 2011)
- ↑ Strategija kibernetske varnosti (2016)
- ↑ South Africa Cyber Security Policy, Staatskoerant No. 39475, 4 Desember 2015
- ↑ South Africa Cyber Security Policy, Staatskoerant No. 32963, 10 Feb 2010
- ↑ Informations- och cybersäkerhet i Sverige Strategi och åtgärder för säker information i staten(2015)
- ↑ National Cybersecurity Bill (DRAFT approved by the Cabinet on 6 January 2015), Unofficial translation by Thai Netizen Network – March 2015
- ↑ UlUSAL SİBER GÜVENLİk STRATEJİSİ VE
- ↑ Turkey's National Cyber Security Strategy and 2013-2014 Action Plan
- ↑ National Cyber Security Strategy 2016, HM Government
- ↑ National Information Assurance (IA) Glossary, Committee on National Security Systems, CNSS Instruction No. 4009, 26 April 2010.
- ↑ National Infrastructure Protection Plan, Partnering to enhance protection and resiliency, US Department of Homeland Security, 2009
- ↑ NIST Special Publication 800-53 Rev 4: Security and Privacy Controls for Federal Information Systems and Organizations (April 2013)
- ↑ Joint Publication 1-02: Department of Defense Dictionary of Military and Associated Terms (2016)
- ↑ ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, Geneva (2012) - ITU-T X.1205
- ↑ WEF Partnering for Cyber Resilience Guidelines 2012
- ↑ ISO/IEC 27032:2012 Information technology — Security techniques — Guidelines for cybersecurity
- ↑ Scottish Government: Safe, Secure and Prosperous: A Cyber Resilience Strategy for Scotland
- ↑ RUSSIA-‐U.S. BILATERAL ON CYBERSECURITY CRITICAL TERMINOLOGY FOUNDATIONS